default search action
14th ARES 2019: Canterbury, UK
- Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019. ACM 2018, ISBN 978-1-4503-7164-3
ARES Full I - Dependability and resilience
- Tobias Mueller, Ephraim Zimmer, Ludovico de Nittis:
Using Context and Provenance to defend against USB-borne attacks. 1:1-1:9 - Lucas Buschlinger, Markus Springer, Maria Zhdanova:
Plug-and-Patch: Secure Value Added Services for Electric Vehicle Charging. 2:1-2:10 - Jukka Soikkeli, Luis Muñoz-González, Emil Lupu:
Efficient Attack Countermeasure Selection Accounting for Recovery and Action Costs. 3:1-3:10
ARES Full II - Best Paper Session
- Marius Musch, Christian Wressnegger, Martin Johns, Konrad Rieck:
Thieves in the Browser: Web-based Cryptojacking in the Wild. 4:1-4:10 - Juraj Smeriga, Tomás Jirsík:
Behavior-Aware Network Segmentation using IP Flows. 5:1-5:9 - Morteza Safaei Pour, Antonio Mangino, Kurt Friday, Matthias Rathbun, Elias Bou-Harb, Farkhund Iqbal, Khaled B. Shaban, Abdelkarim Erradi:
Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild. 6:1-6:10
ARES Full III - Software security
- Julien Proy, Karine Heydemann, Alexandre Berzati, Fabien Majéric, Albert Cohen:
A First ISA-Level Characterization of EM Pulse Effects on Superscalar Microarchitectures: A Secure Software Perspective. 7:1-7:10 - Johannes Feichtner, Christof Rabensteiner:
Obfuscation-Resilient Code Recognition in Android Apps. 8:1-8:10 - Elaine Venson, Xiaomeng Guo, Zidi Yan, Barry W. Boehm:
Costing Secure Software Development: A Systematic Mapping Study. 9:1-9:11
ARES Full IV - Cryptographic mechanisms and applications I
- Stephan Krenn, Kai Samelin, Christoph Striecks:
Practical Group-Signatures with Privacy-Friendly Openings. 10:1-10:10 - Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
E2E Verifiable Borda Count Voting System without Tallying Authorities. 11:1-11:9
ARES Full V - Cryptographic mechanisms and applications II
- Ferhat Karakoç, Majid Nateghizad, Zekeriya Erkin:
SET-OT: A Secure Equality Testing Protocol Based on Oblivious Transfer. 12:1-12:9 - Olivier Blazy, Laura Brouilhet, Duong Hieu Phan:
Anonymous Identity Based Encryption with Traceable Identities. 13:1-13:10
ARES Full VI - Network Security I
- Florian Wilkens, Steffen Haas, Dominik Kaaser, Peter Kling, Mathias Fischer:
Towards Efficient Reconstruction of Attacker Lateral Movement. 14:1-14:9 - Michael Pfeiffer, Michael Rossberg, Simon Buttgereit, Guenter Schaefer:
Strong Tenant Separation in Cloud Computing Platforms. 15:1-15:10 - Mauro Conti, Ankit Gangwal, Michele Todero:
Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages. 16:1-16:8
ARES Full VII - Web security and attacks
- Junaid Iqbal, Ratinder Kaur, Natalia Stakhanova:
PoliDOM: Mitigation of DOM-XSS by Detection and Prevention of Unauthorized DOM Tampering. 17:1-17:10 - Christos Iliou, Theodoros Kostoulas, Theodora Tsikrika, Vasilis Katos, Stefanos Vrochidis, Yiannis Kompatsiaris:
Towards a framework for detecting advanced Web bots. 18:1-18:10 - Pavlo Burda, Coen Boot, Luca Allodi:
Characterizing the Redundancy of DarkWeb .onion Services. 19:1-19:10
ARES Full VIII - Network Security I
- Ryan R. Curtin, Andrew B. Gardner, Slawomir Grzonkowski, Alexey Kleymenov, Alejandro Mosquera:
Detecting DGA domains with recurrent neural networks and side information. 20:1-20:10 - Aditya Kuppa, Slawomir Grzonkowski, Muhammad Rizwan Asghar, Nhien-An Le-Khac:
Black Box Attacks on Deep Anomaly Detectors. 21:1-21:10
ARES Short I - Identity, authorization and privacy
- Mohammad Hajian Berenjestanaki, Mauro Conti, Ankit Gangwal:
On the Exploitation of Online SMS Receiving Services to Forge ID Verification. 22:1-22:5 - Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Does "www." Mean Better Transport Layer Security? 23:1-23:7 - Francesco Buccafurri, Vincenzo De Angelis, Gianluca Lax, Lorenzo Musarella, Antonia Russo:
An Attribute-Based Privacy-Preserving Ethereum Solution for Service Delivery with Accountability Requirements. 24:1-24:6
ARES Short II - Threat detection and response
- Khanh-Huu-The Dam, Tayssir Touili:
STAMAD: a STAtic MAlware Detector. 25:1-25:6 - Ludwig Englbrecht, Gregor Langner, Günther Pernul, Gerald Quirchmayr:
Enhancing credibility of digital evidence through provenance-based incident response handling. 26:1-26:6 - Christopher Stelly, Vassil Roussev:
Language-based Integration of Digital Forensics & Incident Response. 27:1-27:6
ARES Short III
- Olivier Blazy, Céline Chevalier, Quoc-Huy Vu:
Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions. 28:1-28:6 - Markus Hittmeir, Andreas Ekelhart, Rudolf Mayer:
On the Utility of Synthetic Data: An Empirical Evaluation on Machine Learning Tasks. 29:1-29:6 - Mohamad Imad Mahaini, Shujun Li, Rahime Belen Saglam:
Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example. 30:1-30:9
FARES I - Protection and Detection
- Ahmed Mahmoud Alwakeel, Abdulrahman Khalid Alnaim, Eduardo B. Fernández:
A Pattern for a Virtual Network Function (VNF). 31:1-31:7 - Pooria Madani, Natalija Vlajic:
Near-optimal Evasion of Randomized Convex-inducing Classifiers in Adversarial Environments. 32:1-32:6 - Giuseppe Bernieri, Mauro Conti, Gabriele Pozzan:
AMON: an Automaton MONitor for Industrial Cyber-Physical Security. 33:1-33:10 - Michal Javorník, Jana Komárková, Martin Husák:
Decision Support for Mission-Centric Cyber Defence. 34:1-34:8
FARES II - Measurement and Robust Design
- Thomas Clédel, Nora Cuppens, Frédéric Cuppens:
Managing the Overestimation of Resilience. 35:1-35:10 - Martin Horák, Václav Stupka, Martin Husák:
GDPR Compliance in Cybersecurity Software: A Case Study of DPIA in Information Sharing Platform. 36:1-36:8 - Muhammad Mudassar Yamin, Basel Katt:
Cyber Security Skill Set Analysis for Common Curricula Development. 37:1-37:8
WSDF I
- Oren Halvani, Christian Winter, Lukas Graner:
Assessing the Applicability of Authorship Verification Methods. 38:1-38:10 - Huajian Liu, Martin Steinebach, Kathrin Schölei:
Improved Manipulation Detection with Convolutional Neural Network for JPEG Images. 39:1-39:6 - Patrício Domingues, Alexandre Frazão Rosário:
Deep Learning-based Facial Detection and Recognition in Still Images for Digital Forensics. 40:1-40:10
WSDF II
- Thomas Göbel, Jan Türr, Harald Baier:
Revisiting Data Hiding Techniques for Apple File System. 41:1-41:10 - Courtney Hassenfeldt, Shabana Baig, Ibrahim M. Baggili, Xiaolu Zhang:
Map My Murder: A Digital Forensic Study of Mobile Health and Fitness Applications. 42:1-42:12 - Xiaoyu Du, Mark Scanlon:
Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts. 43:1-43:8
WSDF III
- Daniel Spiekermann, Tobias Eggendorfer, Jörg Keller:
A Study of Network Forensic Investigation in Docker Environments. 44:1-44:7 - Ahmad Atamli, Giuseppe Petracca, Jon Crowcroft:
IO-Trust: An out-of-band trusted memory acquisition for intrusion detection and Forensics investigations in cloud IOMMU based systems. 45:1-45:6 - Tina Wu, Frank Breitinger, Ibrahim M. Baggili:
IoT Ignorance is Digital Forensics Research Bliss: A Survey to Understand IoT Forensics Definitions, Challenges and Future Research Directions. 46:1-46:15
IWSMA I
- Tobias Groß, Matanat Ahmadova, Tilo Müller:
Analyzing Android's File-Based Encryption: Information Leakage through Unencrypted Metadata. 47:1-47:7 - Soundes Marzougui, Juliane Krämer:
Post-Quantum Cryptography in Embedded Systems. 48:1-48:7 - Marcus Botacin, Anatoli Kalysch, André Grégio:
The Internet Banking [in]Security Spiral: Past, Present, and Future of Online Banking Protection Mechanisms based on a Brazilian case study. 49:1-49:10
IWCC I
- York Yannikos, Julian Heeger, Maria Brockmeyer:
An Analysis Framework for Product Prices and Supplies in Darknet Marketplaces. 50:1-50:7 - Andrea Tundis, Leon Böck, Victoria Stanilescu, Max Mühlhäuser:
Limits in the data for detecting criminals on social media. 51:1-51:8
IWCC II
- Elena Doynikova, Andrey Fedorchenko, Igor V. Kotenko:
Ontology of Metrics for Cyber Security Assessment. 52:1-52:8 - Tobias Dam, Lukas Daniel Klausner, Damjan Buhov, Sebastian Schrittwieser:
Large-Scale Analysis of Pop-Up Scam on Typosquatting URLs. 53:1-53:9 - Mariano Di Martino, Peter Quax, Wim Lamotte:
Realistically Fingerprinting Social Media Webpages in HTTPS Traffic. 54:1-54:10
IWCC III
- Martin Steinebach, Karol Gotkowski, Huajian Liu:
Fake News Detection by Image Montage Recognition. 55:1-55:9 - Alexander Aigner, Rene Zeller:
HEHLKAPPE: Utilizing Deep Learning to Manipulate Surveillance Camera Footage in Real-Time. 56:1-56:8 - Felix Anda, David Lillis, Aikaterini Kanta, Brett A. Becker, Elias Bou-Harb, Nhien-An Le-Khac, Mark Scanlon:
Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning. 57:1-57:8
SSE I - Secure Software Development
- Shao-Fang Wen, Basel Katt:
Learning Software Security in Context: An Evaluation in Open Source Software Development Environment. 58:1-58:10 - Inger Anne Tøndel, Daniela Soares Cruzes, Martin Gilje Jaatun, Kalle Rindell:
The Security Intention Meeting Series as a way to increase visibility of software security decisions in agile development projects. 59:1-59:8
SSE II - Managing security on applications
- Kalle Rindell, Karin Bernsmed, Martin Gilje Jaatun:
Managing Security in Software: Or: How I Learned to Stop Worrying and Manage the Security Technical Debt. 60:1-60:8 - Irdin Pekaric, Clemens Sauerwein, Michael Felderer:
Applying Security Testing Techniques to Automotive Engineering. 61:1-61:10 - Serafettin Sentürk, Hasan Yasar, Ibrahim Sogukpinar:
Model Driven Security in a Mobile Banking Application Context. 62:1-62:7
CUING I - Keynote Session: CUING II
- Steffen Wendzel:
Protocol-independent Detection of "Messaging Ordering" Network Covert Channels. 63:1-63:8 - Tobias Schmidbauer, Steffen Wendzel, Aleksandra Mileva, Wojciech Mazurczyk:
Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks. 64:1-64:10 - Krzysztof Cabaj, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski:
Fine-tuning of Distributed Network Covert Channels Parameters and Their Impact on Undetectability. 65:1-65:8
CUING III
- Martin Steinebach, Marcel Schäfer, Alexander Karakuz, Katharina Brandl, York Yannikos:
Detection and Analysis of Tor Onion Services. 66:1-66:10 - Donatello Luna, Luca Allodi, Marco Cremonini:
Productivity and Patterns of Activity in Bug Bounty Programs: Analysis of HackerOne and Google Vulnerability Research. 67:1-67:10 - Michal Choras, Marek Pawlicki, Rafal Kozik, Konstantinos P. Demestichas, Pavlos Kosmides, Manik Gupta:
SocialTruth Project Approach to Online Disinformation (Fake News) Detection and Mitigation. 68:1-68:10
CUING IV
- Wojciech Mazurczyk, Przemyslaw Szary, Steffen Wendzel, Luca Caviglione:
Towards Reversible Storage Network Covert Channels. 69:1-69:8 - Martin Steinebach, Sebastian Lutz, Huajian Liu:
Privacy and Robust Hashes. 70:1-70:8
IoT-SECFOR I
- Zhuohua Li, Jincheng Wang, Mingshen Sun, John C. S. Lui:
Securing the Device Drivers of Your Embedded Systems: Framework and Prototype. 71:1-71:10 - Musa G. Samaila, Moser Z. V. José, João B. F. Sequeiros, Mário M. Freire, Pedro R. M. Inácio:
IoT-HarPSecA: A Framework for Facilitating the Design and Development of Secure IoT Devices. 72:1-72:7
IoT-SECFOR II
- Pradip Mainali, Carlton Shepherd:
Privacy-Enhancing Fall Detection from Remote Sensor Data Using Multi-Party Computation. 73:1-73:10 - Konstantin Mikhaylov, Radek Fujdiak, Ari Pouttu, Miroslav Voznák, Lukas Malina, Petr Mlynek:
Energy Attack in LoRaWAN: Experimental Validation. 74:1-74:6 - Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Radek Fujdiak:
A Secure Publish/Subscribe Protocol for Internet of Things. 75:1-75:10
IWSECC I
- Maxime Bélair, Sylvie Laniepce, Jean-Marc Menaud:
Leveraging Kernel Security Mechanisms to Improve Container Security: a Survey. 76:1-76:6 - Abdulrahman Khalid Alnaim, Ahmed Mahmoud Alwakeel, Eduardo B. Fernández:
A Misuse Pattern for Compromising VMs via Virtual Machine Escape in NFV. 77:1-77:6
IWSECC II
- Luca Calderoni:
Preserving context security in AWS IoT Core. 78:1-78:5 - Khaoula Es-Salhi, David Espes, Nora Cuppens:
DTE Access Control Model for Integrated ICS Systems. 79:1-79:9
WCTI I
- Hamid Reza Ghaeini, Nils Ole Tippenhauer, Jianying Zhou:
Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures. 80:1-80:10
CyberTIM II - Threat prediction, detection and mitigation
- Martin Husák, Jaroslav Kaspar:
AIDA Framework: Real-Time Correlation and Prediction of Intrusion Detection Alerts. 81:1-81:8 - Christian Doll, Arnold Sykosch, Marc Ohm, Michael Meier:
Automated Pattern Inference Based on Repeatedly Observed Malware Artifacts. 82:1-82:10 - Thomas Schaberreiter, Veronika Kupfersberger, Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Christos Ilioudis, Gerald Quirchmayr:
A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources. 83:1-83:10
CyberTIM III - Threat Intelligence Sharing
- Václav Bartos:
NERD: Network Entity Reputation Database. 84:1-84:7 - Adam Zibak, Andrew Simpson:
Cyber Threat Information Sharing: Perceived Benefits and Barriers. 85:1-85:9 - Peter Amthor, Daniel Fischer, Winfried E. Kühnhauser, Dirk Stelzer:
Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems. 86:1-86:10
BASS I - Privacy, Authentication, and Access Control
- Pradip Mainali, Carlton Shepherd, Fabien A. P. Petitcolas:
Privacy-Enhancing Context Authentication from Location-Sensitive Data. 87:1-87:10 - Farah Dernaika, Nora Cuppens-Boulahia, Frédéric Cuppens, Olivier Raynaud:
Semantic Mediation for A Posteriori Log Analysis. 88:1-88:10 - Yousra Javed, Shashank Sethi, Akshay Jadoun:
Alexa's Voice Recording Behavior: A Survey of User Understanding and Awareness. 89:1-89:10
BASS II - Communication networks
- Jorge Maestre Vidal, Marco Antonio Sotelo Monge:
Adversarial Communication Networks Modeling for Intrusion Detection Strengthened against Mimicry. 90:1-90:6
IWSMR I
- Peter Hamm, David Harborth, Sebastian Pape:
A Systematic Analysis of User Evaluations in Security Research. 91:1-91:7 - Damjan Fujs, Anze Mihelic, Simon L. R. Vrhovec:
The power of interpretation: Qualitative methods in cybersecurity research. 92:1-92:10 - Caroline Moeckel:
Examining and Constructing Attacker Categorisations: an Experimental Typology for Digital Banking. 93:1-93:6
LPW I
- Stephen B. Wicker:
eBook Readers, Location Surveillance and the Threat to Freedom of Association. 94:1-94:7
LPW II
- Thanassis Giannetsos, Ioannis Krontiris:
Securing V2X Communications for the Future: Can PKI Systems offer the answer? 95:1-95:8 - Khuong An Nguyen, Raja Naeem Akram, Konstantinos Markantonakis, Zhiyuan Luo, Chris Watkins:
Location Tracking Using Smartphone Accelerometer and Magnetometer Traces. 96:1-96:9
LPW III
- Matthias Caesar, Jan Steffan:
A Location Privacy Analysis of Bluetooth Mesh. 97:1-97:7 - Luke R. Parker, Paul D. Yoo, A. Taufiq Asyhari, Lounis Chermak, Yoonchan Jhi, Kamal Taha:
DEMISe: Interpretable Deep Extraction and Mutual Information Selection Techniques for IoT Intrusion Detection. 98:1-98:10
WISI I
- Simon D. Duque Antón, Daniel Fraunholz, Hans Dieter Schotten:
Using Temporal and Topological Features for Intrusion Detection in Operational Networks. 99:1-99:9 - Lucian Popa, Bogdan Groza, Pal-Stefan Murvay:
Performance Evaluation of Elliptic Curve Libraries on Automotive-Grade Microcontrollers. 100:1-100:7
WISI II
- Björn Leander, Aida Causevic, Hans Hansson:
Applicability of the IEC 62443 standard in Industry 4.0 / IIoT. 101:1-101:8 - Ralph Ankele, Stefan Marksteiner, Kai Nahrgang, Heribert Vallant:
Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing. 102:1-102:8 - Nirojan Selvanathan, Dileepa Jayakody, Violeta Damjanovic-Behrendt:
Federated Identity Management and Interoperability for Heterogeneous Cloud Platform Ecosystems. 103:1-103:7
5G-NS I
- Raimo Kantola:
6G Network Needs to Support Embedded Trust. 104:1-104:5 - Jorge Maestre Vidal, Marco Antonio Sotelo Monge:
Framework for Anticipatory Self-Protective 5G Environments. 105:1-105:9
5G-NS II
- Joo Yeon Cho, Andrew Sergeev, Jim Zou:
Securing Ethernet-based Optical Fronthaul for 5G Network. 106:1-106:6 - Markus Theil, Martin Backhaus, Michael Rossberg, Guenter Schaefer:
Towards a Security Architecture for Hybrid WMNs. 107:1-107:10 - Krzysztof Cabaj, Marcin Gregorczyk, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski:
Sniffing Detection within the Network: Revisiting Existing and Proposing Novel Approaches. 108:1-108:8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.